Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-11-18360 netlabHui Wang, Alex.Turing, litao3rd, YANG XU
@online{wang:20211118:pitfall:23ff4ea, author = {Hui Wang and Alex.Turing and litao3rd and YANG XU}, title = {{The Pitfall of Threat Intelligence Whitelisting: Specter Botnet is 'taking over' Top Legit DNS Domains By Using ClouDNS Service}}, date = {2021-11-18}, organization = {360 netlab}, url = {https://blog.netlab.360.com/the-pitfall-of-threat-intelligence-whitelisting-specter-botnet-is-taking-over-top-legit-dns-domains-by-using-cloudns-service/}, language = {English}, urldate = {2021-11-19} } The Pitfall of Threat Intelligence Whitelisting: Specter Botnet is 'taking over' Top Legit DNS Domains By Using ClouDNS Service
Specter
2021-11-12360 netlabAlex.Turing, Hui Wang, YANG XU
@online{alexturing:20211112:malware:70f965d, author = {Alex.Turing and Hui Wang and YANG XU}, title = {{Malware uses namesilo Parking pages and Google's custom pages to spread}}, date = {2021-11-12}, organization = {360 netlab}, url = {https://blog.netlab.360.com/zhatuniubility-malware-uses-namesilo-parking-pages-and-googles-custom-pages-to-spread/}, language = {English}, urldate = {2021-11-17} } Malware uses namesilo Parking pages and Google's custom pages to spread
2021-11-09360 netlabAlex.Turing, Hui Wang
@online{alexturing:20211109:abcbot:8e1eee4, author = {Alex.Turing and Hui Wang}, title = {{Abcbot, an evolving botnet}}, date = {2021-11-09}, organization = {360 netlab}, url = {https://blog.netlab.360.com/abcbot_an_evolving_botnet_en/}, language = {English}, urldate = {2021-11-17} } Abcbot, an evolving botnet
Abcbot
2021-09-28NetlabHui Wang, Alex.Turing, YANG XU
@online{wang:20210928:miraiptearimasuta:2349f41, author = {Hui Wang and Alex.Turing and YANG XU}, title = {{Mirai_ptea_Rimasuta variant is exploiting a new RUIJIE router 0 day to spread}}, date = {2021-09-28}, organization = {Netlab}, url = {https://blog.netlab.360.com/rimasuta-spread-with-ruijie-0day-en/}, language = {English}, urldate = {2021-10-24} } Mirai_ptea_Rimasuta variant is exploiting a new RUIJIE router 0 day to spread
Mirai
2021-08-30360 netlabAlex.Turing, Hui Wang, GenShen Ye
@online{alexturing:20210830:mostly:d4d0f30, author = {Alex.Turing and Hui Wang and GenShen Ye}, title = {{The Mostly Dead Mozi and Its’ Lingering Bots}}, date = {2021-08-30}, organization = {360 netlab}, url = {https://blog.netlab.360.com/the-mostly-dead-mozi-and-its-lingering-bots/}, language = {English}, urldate = {2021-08-31} } The Mostly Dead Mozi and Its’ Lingering Bots
Mozi
2021-07-01360 netlabHui Wang, Alex.Turing, Jinye, houliuyang, Chai Linyuan
@online{wang:20210701:miraiptea:3ba235e, author = {Hui Wang and Alex.Turing and Jinye and houliuyang and Chai Linyuan}, title = {{Mirai_ptea Botnet is Exploiting Undisclosed KGUARD DVR Vulnerability}}, date = {2021-07-01}, organization = {360 netlab}, url = {https://blog.netlab.360.com/mirai_ptea-botnet-is-exploiting-undisclosed-kguard-dvr-vulnerability-en/}, language = {English}, urldate = {2021-07-11} } Mirai_ptea Botnet is Exploiting Undisclosed KGUARD DVR Vulnerability
Mirai
2021-04-28360 netlabAlex Turing, Hui Wang
@online{turing:20210428:rotajakiro:3d85cc1, author = {Alex Turing and Hui Wang}, title = {{RotaJakiro: A long live secret backdoor with 0 VT detection}}, date = {2021-04-28}, organization = {360 netlab}, url = {https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/}, language = {English}, urldate = {2021-05-04} } RotaJakiro: A long live secret backdoor with 0 VT detection
RotaJakiro
2020-11-20360 netlabHui Wang, Alex Turing, CNCERT, Qihoo 360
@online{wang:20201120:moobot:bee7c03, author = {Hui Wang and Alex Turing and CNCERT and Qihoo 360}, title = {{MooBot on the run using another 0 day targeting UNIX CCTV DVR}}, date = {2020-11-20}, organization = {360 netlab}, url = {https://blog.netlab.360.com/moobot-0day-unixcctv-dvr-en/}, language = {English}, urldate = {2020-11-23} } MooBot on the run using another 0 day targeting UNIX CCTV DVR
MooBot
2020-11-13NetlabAlex Turing, Hui Wang
@online{turing:20201113:quick:fd9e5d2, author = {Alex Turing and Hui Wang}, title = {{Quick update on the Linux.Ngioweb botnet, now it is going after IoT devices}}, date = {2020-11-13}, organization = {Netlab}, url = {https://blog.netlab.360.com/linux-ngioweb-v2-going-after-iot-devices-en/}, language = {English}, urldate = {2020-11-18} } Quick update on the Linux.Ngioweb botnet, now it is going after IoT devices
Ngioweb
2020-09-30360netlabHui Wang, Alex Turing
@online{wang:20200930:ttint:fb14c9f, author = {Hui Wang and Alex Turing}, title = {{Ttint: 一款通过2个0-day漏洞传播的IoT远控木马}}, date = {2020-09-30}, organization = {360netlab}, url = {https://blog.netlab.360.com/ttint-an-iot-rat-uses-two-0-days-to-spread/}, language = {Chinese}, urldate = {2020-10-04} } Ttint: 一款通过2个0-day漏洞传播的IoT远控木马
2020-09-25360netlabAlex Turing, Hui Wang
@online{turing:20200925:ghost:4b56424, author = {Alex Turing and Hui Wang}, title = {{Ghost in action: the Specter botnet}}, date = {2020-09-25}, organization = {360netlab}, url = {https://blog.netlab.360.com/ghost-in-action-the-specter-botnet/}, language = {English}, urldate = {2020-10-04} } Ghost in action: the Specter botnet
Specter
2020-07-10360 netlabAlex Turing, Hui Wang
@online{turing:20200710:new:2d912a8, author = {Alex Turing and Hui Wang}, title = {{The new Bigviktor Botnet is Targeting DrayTek Vigor Router}}, date = {2020-07-10}, organization = {360 netlab}, url = {https://blog.netlab.360.com/bigviktor-dga-botnet/}, language = {English}, urldate = {2020-07-15} } The new Bigviktor Botnet is Targeting DrayTek Vigor Router
BigViktor
2020-07-09360 netlabAlex Turing, Hui Wang
@online{turing:20200709:update:9e65288, author = {Alex Turing and Hui Wang}, title = {{An Update for a Very Active DDos Botnet: Moobot}}, date = {2020-07-09}, organization = {360 netlab}, url = {https://blog.netlab.360.com/ddos-botnet-moobot-en/}, language = {English}, urldate = {2020-07-15} } An Update for a Very Active DDos Botnet: Moobot
MooBot
2020-04-27360 netlabAlex Turing, Hui Wang
@online{turing:20200427:leethozer:43893b8, author = {Alex Turing and Hui Wang}, title = {{The LeetHozer botnet}}, date = {2020-04-27}, organization = {360 netlab}, url = {https://blog.netlab.360.com/the-leethozer-botnet-en/}, language = {English}, urldate = {2020-05-20} } The LeetHozer botnet
LeetHozer
2020-02-02360 netlabAlex.Turing, Hui Wang, Liu Yang
@online{alexturing:20200202:new:4a4ebd9, author = {Alex.Turing and Hui Wang and Liu Yang}, title = {{New Threat: Matryosh Botnet Is Spreading}}, date = {2020-02-02}, organization = {360 netlab}, url = {https://blog.netlab.360.com/matryosh-botnet-is-spreading-en/}, language = {English}, urldate = {2021-02-04} } New Threat: Matryosh Botnet Is Spreading
Matryosh
2018-11-07360 netlabHui Wang, RootKiter
@online{wang:20181107:bcmpupnphunter:1d4af4a, author = {Hui Wang and RootKiter}, title = {{BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers}}, date = {2018-11-07}, organization = {360 netlab}, url = {https://blog.netlab.360.com/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers-en/}, language = {English}, urldate = {2020-01-06} } BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers
BCMPUPnP_Hunter
2018Qihoo 360 TechnologyYa Liu, Hui Wang
@online{liu:2018:tracking:2ca5e73, author = {Ya Liu and Hui Wang}, title = {{Tracking Mirai variants (Appendix: Hashes)}}, date = {2018}, organization = {Qihoo 360 Technology}, url = {https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/#h2-appendix-sample-sha256-hashes}, language = {English}, urldate = {2019-11-27} } Tracking Mirai variants (Appendix: Hashes)
Masuta
2013-12-23360 netlabAlex Turing, Hui Wang
@online{turing:20131223:mozi:12a14ab, author = {Alex Turing and Hui Wang}, title = {{Mozi, Another Botnet Using DHT}}, date = {2013-12-23}, organization = {360 netlab}, url = {https://blog.netlab.360.com/mozi-another-botnet-using-dht/}, language = {English}, urldate = {2021-05-12} } Mozi, Another Botnet Using DHT
Mozi